OPERATING SYSTEMS Lecture Notes

Total Page:16

File Type:pdf, Size:1020Kb

OPERATING SYSTEMS Lecture Notes Shri Vishnu Engineering College for Women OPERATING SYSTEMS Lecture Notes DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN (Approved by AICTE, Accredited by NBA, Affiliated to JNTU Kakinada) BHIMAVARAM – 534 202 Dept. of Computer Science and Engineering Page 1 Shri Vishnu Engineering College for Women Dept. of Computer Science and Engineering Page 2 Shri Vishnu Engineering College for Women UNIT -1 COMPUTER SYSTEM AND OPERATING SYSTEM OVERVIEW OVER VIEW OF OPERATING SYSTEM What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware Operating system goals: Execute user programs and make solving user problems easier Make the computer system convenient to use Use the computer hardware in an efficient manner Computer System Structure Computer system can be divided into four components Hardware – provides basic computing resources CPU, memory, I/O devices Operating system Controls and coordinates use of hardware among various applications and users Application programs – define the ways in which the system resources are used to solve the computing problems of the users Word processors, compilers, web browsers, database systems, video games Users People, machines, other computers Four Components of a Computer System Operating System Definition OS is a resource allocator Manages all resources Decides between conflicting requests for efficient and fair resource use OS is a control program Controls execution of programs to prevent errors and improper use of the computer No universally accepted definition Everything a vendor ships when you order an operating system” is good approximation But varies wildly Dept. of Computer Science and Engineering Page 3 Shri Vishnu Engineering College for Women “The one program running at all times on the computer” is the kernel. Everything else is either a system program (ships with the operating system) or an application program Computer Startup bootstrap program is loaded at power-up or reboot Typically stored in ROM or EPROM, generally known as firmware Initializes all aspects of system Loads operating system kernel and starts execution Computer System Organization Computer-system operation One or more CPUs, device controllers connect through common bus providing access to shared memory Concurrent execution of CPUs and devices competing for memory cycles Computer-System Operation I/O devices and the CPU can execute concurrently Each device controller is in charge of a particular device type Each device controller has a local buffer CPU moves data from/to main memory to/from local buffers I/O is from the device to local buffer of controller Device controller informs CPU that it has finished its operation by causing An interrupt Common Functions of Interrupts Interrupt transfers control to the interrupt service routine generally, through the interrupt vector, which contains the addresses of all the service routines Interrupt architecture must save the address of the interrupted instruction Incoming interrupts are disabled while another interrupt is being processed to prevent a lost interruptnA trap is a software-generated interrupt caused either by an error or a user request An operating system is interrupt driven Interrupt Handling The operating system preserves the state of the CPU by storing registers and the program counter Determines which type of interrupt has occurred: polling Dept. of Computer Science and Engineering Page 4 Shri Vishnu Engineering College for Women vectored interrupt system Separate segments of code determine what action should be taken for each type of interrupt Interrupt Timeline I/O Structure After I/O starts, control returns to user program only upon I/O completion Wait instruction idles the CPU until the next interrupt Wait loop (contention for memory access) At most one I/O request is outstanding at a time, no simultaneous I/O processing After I/O starts, control returns to user program without waiting for I/O completion System call – request to the operating system to allow user to wait for I/O completion Device-status table contains entry for each I/O device indicating its type, address, and state Operating system indexes into I/O device table to determine device status and to modify table entry to include interrupt Direct Memory Access Structure Used for high-speed I/O devices able to transmit information at close to memory speeds Device controller transfers blocks of data from buffer storage directly to main memory without CPU intervention Only one interrupt is generated per block, rather than the one interrupt per byte Storage Structure Main memory – only large storage media that the CPU can access directly Secondary storage – extension of main memory that provides large nonvolatile storage capacity Magnetic disks – rigid metal or glass platters covered with magnetic recording material Disk surface is logically divided into tracks, which are subdivided into sectors The disk controller determines the logical interaction between the device and the computer Storage Hierarchy Storage systems organized in hierarchy Speed Cost Volatility Caching – copying information into faster storage system; main memory can be viewed as a last cache for secondary storage Dept. of Computer Science and Engineering Page 5 Shri Vishnu Engineering College for Women Caching Important principle, performed at many levels in a computer (in hardware, operating system, software) Information in use copied from slower to faster storage temporarily Faster storage (cache) checked first to determine if information is there If it is, information used directly from the cache (fast) If not, data copied to cache and used there Cache smaller than storage being cached Cache management important design problem Cache size and replacement policy Computer-System Architecture Most systems use a single general-purpose processor (PDAs through mainframes) Most systems have special-purpose processors as well Multiprocessors systems growing in use and importance Also known as parallel systems, tightly-coupled systems Advantages include 1.Increased throughput 2.Economy of scale 3.Increased reliability – graceful degradation or fault tolerance Two types 1.Asymmetric Multiprocessing 2.Symmetric Multiprocessing Dept. of Computer Science and Engineering Page 6 Shri Vishnu Engineering College for Women How a Modern Computer Works Symmetric Multiprocessing Architecture A Dual-Core Design Clustered Systems Like multiprocessor systems, but multiple systems working together Usually sharing storage via a storage-area network (SAN) Provides a high-availability service which survives failures Asymmetric clustering has one machine in hot-standby mode Symmetric clustering has multiple nodes running applications, monitoring each other Some clusters are for high-performance computing (HPC) Applications must be written to use parallelization Operating System Structure Multiprogramming needed for efficiency Single user cannot keep CPU and I/O devices busy at all times Multiprogramming organizes jobs (code and data) so CPU always has one to Execute A subset of total jobs in system is kept in memory Dept. of Computer Science and Engineering Page 7 Shri Vishnu Engineering College for Women One job selected and run via job scheduling When it has to wait (for I/O for example), OS switches to another job Timesharing (multitasking) is logical extension in which CPU switches jobs so frequently that users can interact with each job while it is running, creating interactive computing Response time should be < 1 second Each user has at least one program executing in memory [process If several jobs ready to run at the same time [ CPU scheduling If processes don’t fit in memory, swapping moves them in and out to run Virtual memory allows execution of processes not completely in memory Memory Layout for Multiprogrammed System Operating-System Operations Interrupt driven by hardware Software error or request creates exception or trap Division by zero, request for operating system service Other process problems include infinite loop, processes modifying each Other or the operating system Dual-mode operation allows OS to protect itself and other system components User mode and kernel mode Mode bit provided by hardware Provides ability to distinguish when system is running user code or kernel code Some instructions designated as privileged, only executable in kernel mode System call changes mode to kernel, return from call resets it to user Transition from User to Kernel Mode Timer to prevent infinite loop / process hogging resources Set interrupt after specific period Operating system decrements counter When counter zero generate an interrupt Set up before scheduling process to regain control or terminate program that exceeds allotted time Dept. of Computer Science and Engineering Page 8 Shri Vishnu Engineering College for Women UNIT - 1 OPERATING SYSTEM FUNCTIONS Process Management A process is a program in execution. It is a unit of work within the system. Program is a passive entity, process is an active entity. Process needs resources to accomplish its task CPU, memory, I/O, files Initialization data Process termination requires reclaim of any reusable resources Single-threaded process has one program counter specifying location of next instruction to execute Process executes instructions sequentially, one at a time, until completion Multi-threaded process has one program counter per thread Typically system has many processes, some user, some
Recommended publications
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • 802.11N Support in Freebsd (For the Run(4) Driver)
    802.11n support in FreeBSD (for the run(4) driver) 15412 F’19 1 / 15 Motivation ● “Do something with operating systems” – OS Junkie: Ubuntu → Fedora → Arch Linux → Gentoo → FreeBSD ● Do something for the community – So much free (not free as in free beer) software out there for use – Time to give something back! ● Faster WiFi doesn’t hurt – Makes FreeBSD more usable ● Less angry users: “But this works on Lunix!” 2 / 15 FreeBSD ● Open source, UNIX ● Official webpage: freebsd.org ● Large, helpful community – IRC Channels on Freenode (#freebsd) – Forums (forums.freebsd.org) – Mailing lists (lists.freebsd.org) ● Latest Release: FreeBSD 12 (2018) 3 / 15 802.11 ● IEEE 802.11: Standard for WiFi – 802.11b: 2.4GHz, Max rate 11 Mbps, range 150 ft., Year 1999 – 802.11g: 2.4 GHz, Max rate 54 Mbps, range 150 ft., Year 2003 – 802.11n: 2.4GHz or 5 GHz, Max rate 300 Mbps (single antenna), 450 Mbps (MIMO), range 175 ft., Year 2009 4 / 15 Ralink ● Produces WiFi chips – See https://wikidevi.com/wiki/Ralink for list of chips ● Linux driver: rt2800usb (USB Ralink 802.11n devices) ( https://wiki.debian.org/rt2800usb). ● FreeBSD driver: run (see https://www.freebsd.org/cgi/man.cgi?run(4) ) – Caveats : “The run driver does not support any of the 802.11n capabilities offered by the RT2800, RT3000 and RT3900 chipsets.“ 5 / 15 Existing code base ● The run driver supports several chipsets and adapters (such as ASUS USB N-66) but without support for 802.11n – This means reduced speeds – This means it will misbehave when you turn on your microwave ● run(4) also has annoying ‘device timeout’ errors where the card stops responding.
    [Show full text]
  • Cgatools Install Guide
    cgatools Installation Guide Version 1.2.0 Complete Genomics data is for Research Use Only and not for use in the treatment or diagnosis of any human subject. Information, descriptions and specifications in this publication are subject to change without notice. Copyright © 2010 Complete Genomics Incorporated. All rights reserved. cgatools Installation Guide Table Of Contents Table Of Contents Preface ........................................................................................................................................................................... 3 Conventions ................................................................................................................................................................................ 3 cgatools Documents ................................................................................................................................................................ 3 References ................................................................................................................................................................................... 3 Overview and Requirements ................................................................................................................................. 5 Install Process in a Nutshell ................................................................................................................................................. 5 User Requirements .................................................................................................................................................................
    [Show full text]
  • AD Management Tool Exhaustive Reports on User, Group, Computer, Exchange & GPO
    Stories Firehose All Popular Polls Video Jobs Deals Submit Search Login or Sig2n7 u7p Topics: Devices Build Entertainment Technology Open Source Science YRO Follow us: Follow Slashdot blog updates by subscribing to our blog RSS feed Nickname: Password: 6-20 characters long Public Terminal Log In Forgot your password? Sign in with Google Facebook Twitter LinkedIn Close AD Management Tool Exhaustive Reports on User, Group, Computer, Exchange & GPO GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support (phoronix.com) $0.32/Mbps IP Posted by timothy on Sunday January 31, 2016 @11:22AM from the pretty-soon-big-and-fancy-like-gnu dept. An anonymous reader writes: GNU developer Samuel Thibault presented at this weekend's FOSDEM conference Transit about the current state of GNU Hurd. He shared that over the past year they've started working on experimental IPv6+IPv4 and BGP For Your sound support as their big new feature. They also have x86 64-bit support to the point that the kernel can boot, but not Network in North America and much beyond that stage yet. USB and other functionality remains a work-in-progress. Those curious about this GNU kernel project can find more details via the presentation media. Europe gnu os software → Tiny Pluto Big On Frozen Water Reserves Kentucky Man Arrested After Shooting Down Drone Are We Reaching the Electric Car Tipping Point? Microsoft Is Downloading Windows 10 Without Asking Test Pilot: the F-35 Can't Dogfight Oregon Testing Pay-Per-Mile Driving Fee To Replace Gas Tax Submission: GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support FTDI Driver Breaks Hardware Again GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support 177 More | Reply Login GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support Post Load All Comments S1e5a Fruchll 8257 7A Cbobmremvieantetsd L0o Hg iIdnd/Cenreate an Account C/Soema ments Filter: AScllore: I5nsightful I4nformative I3nteresting F2unny 1The Fine Print: The following comments are owned by whoever posted them.
    [Show full text]
  • Installation Guide Version 4.2
    AIX Installation Guide Version 4.2 SC23-1924-00 AIX Installation Guide Version 4.2 First Edition (April 1996) This edition of the AIX Version 4.2 Installation Guide applies to the AIX Version 4.2 Licensed Program and to all subsequent releases of this product until otherwise indicated in new releases or technical newsletters. The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local law: THIS MANUAL IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not apply to you. It is not warranted that the contents of this publication or the accompanying source code examples, whether individually or as one or more groups, will meet your requirements or that the publication or the accompanying source code examples are error-free. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. It is possible that this publication may contain references to, or information about, products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that such products, programming, or services will be offered in your country. Any reference to a licensed program in this publication is not intended to state or imply that you can use only that licensed program.
    [Show full text]
  • Implementation of Tripwire: a File System Integrity Checker
    Purdue University Purdue e-Pubs Department of Computer Science Technical Reports Department of Computer Science 1993 The Design and Implementation of Tripwire: A File System Integrity Checker Gene H. Kim Eugene H. Spafford Purdue University, [email protected] Report Number: 93-071 Kim, Gene H. and Spafford, Eugene H., "The Design and Implementation of Tripwire: A File System Integrity Checker" (1993). Department of Computer Science Technical Reports. Paper 1084. https://docs.lib.purdue.edu/cstech/1084 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. THE DESIGN AND IMPLEMENTATION OF TRIPWIRE, A FILE SYSTEM INTEGRITY CHECKER Gene H. Kim Eugene H. SpDlford CSD·TR·93'()7I November 1993 The Design and Implementation of Tripwire: A File System Integrity Checker Purdue Technical Report CSD-TR-93-071 Gene H. Kim and Eugene H. Spafford COAST Laboratory Department of Computer Sciences Purdue University West Lafayette, IN 47907-1398 November 19, 1993 Abstract At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the base exe­ cutable version of the operating system itself. The ability to monitor file systems for unautho­ rized or unexpected changes gives system administrators valuable data for protecting and main­ taining their systems. However, in environments of many networked heterogeneous platforms with different policies and software, the task of monitoring changes becomes quite daunting. Tripwire is tool that aids UNIXl system administrators and users in monitoring a designated set offiles and directories for any changes.
    [Show full text]
  • DNS for Rocket Scientists Section 1 Overview
    DNS for Rocket Scientists This Open Source Guide is about DNS and (mostly) BIND 9.x on Linux (REDHAT Versions 6.x and 7.x) and the BSD's (FreeBSD, OpenBSD and NetBSD). It is meant for newbies, Rocket Scientist wannabees and anyone in between. This Guide was born out of our first attempts a number of years ago at trying to install a much needed DNS service on an early Redhat Linux system. We completed the DNS 'rite of passage' and found it a pretty unedifying and pointless experience. Health Warning: This is still a work-in-progress. If you have expertise in something - contribute some text. If you find errors don't grumble - tell us. Look at our to do list and if you want to contribute something please do so. And for all that hard work we promise only a warm sense of well-being and an acknowledgment of your work in the licence. Section 1 Overview What's new in Guide version 0.1.27 1. Boilerplate and Terminology 1.1 Objectives and Scope 1.2 How to read this Guide 1.3 Terminology and Conventions used 1.4 Acknowledgements 1.5 Copyright and License 2. DNS - Overview 2.1 A brief History of Name Servers 2.2 DNS Concepts & Implementation 2.2.1 DNS Overview 2.2.2 Domains and Delegation 2.2.3 DNS Organization and Structure 2.2.4 DNS System Components 2.2.5 Zones and Zone Files 2.2.6 DNS Queries 2.2.6.1 Recursive Queries 2.2.6.2 Iterative Queries 2.2.6.3 Inverse Queries 2.2.7 Zone Updates 2.2.7.1 Full Zone Transfer (AXFR) 2.2.7.2 Incremental Zone Transfer (IXFR) 2.2.7.3 Notify (NOTIFY) 2.2.7.4 Dynamic Zone Updates 2.2.7.5 Alternative Dynamic DNS Approaches 2.3 DNS Security Overview 2.3.1 Security Threats 2.3.2 Security Types 2.3.3 Local Security 2.3.4 Server-Server (TSIG Transactions) 2.3.5 Server-Client (DNSSEC) 3.
    [Show full text]
  • Geckos – a Unix-Like 6502 Operating System
    GeckOS – a Unix-like 6502 operating system Glenn Holmer VCFMW, 2019-09-14 Speaker Bio ✔ a.k.a. "Cenbe" ✔ retired Java programmer/Linux sysadmin ✔ collector of programming languages and operating systems for the Commodore 64: https://www.lyonlabs.org/commodore/ Happy 50th, Unix! wait... “Unix” on a 6502? ARE YOU CRAZY? wait... “Unix” on a 6502? Multi-tasking on a 6502 faces significant obstacles: ✔ typically no hardware memory management ✔ no hardware process protection (“ring 0”) ✔ limited number of registers ✔ single, fixed-location, 256-byte stack “Unix” on a Commodore 64? ✔ It’s been tried with varying degrees of fidelity, e.g. GeckOS, LUnix, Asterix, ACE... ✔ None of these are still being developed; most developers are no longer active in the Commodore community. ✔ GeckOS seems the most complete, most Unix-like and easiest to work with. GeckOS history ✔ Written by André Fachat, originally for the CS/A65 (a 6502 computer with a MMU that he built in 1989). ✔ Later expanded to run on other architectures (PET, Commodore 64). ✔ 2.0.9 released in 2013. ✔ Source available (GPL V2). André Fachat CS/A65 http://www.6502.org/users/andre/csa/index.html GeckOS features ✔ preemptive multi-tasking with priorities, multi-threading (max. 12 tasks, 12 threads) ✔ signals, semaphores ✔ redirection, piping, environment variables ✔ a standard library (lib6502) ✔ cross-assembler “xa” ✗ use 2.1.4h with GeckOS (not newer versions) ✗ output is o65 relocatable file format ✗ can produce label xref with addresses Cenbe’s Commentary on GeckOS I’ve been working on an analysis of GeckOS for those who would like to follow along at home: https://www.lyonlabs.org/commodore/onrequest/geckos-analysis.html ✔ source layout ✔ system initialization ✔ IRQ service routine ✔ forking new processes ✔ scheduler, task switching ✔ running programs from the shell So how does GeckOS do a task switch? ✔ An interrupt is generated every ~20ms by CIA 1 timer B to run the scheduler.
    [Show full text]
  • Linux Tutorial One -ASP2016- Session 1- 2 August 2016
    Linux Tutorial One -ASP2016- Session 1- 2 August 2016 1.1 Listing files and directories ls (list) When you first login, your current working directory is your home directory. Your home directory has the same name as your user-name, for example, pheneas, and it is where your personal files and subdirectories are saved. To find out what is in your home directory, type % ls (short for list) The ls command lists the contents of your current working directory. There may be no files visible in your home directory, in which case, the LUNIX prompt will be returned. Alternatively, there may already be some files inserted by the System Administrator when your account was created. ls does not, in fact, cause all the files in your home directory to be listed, but only those ones whose name does not begin with a dot (.) Files beginning with a dot (.) are known as hidden files and usually contain important program configuration information. They are hidden because you should not change them unless you are very familiar with LUNIX!!! To list all files in your home directory including those whose names begin with a dot, type % ls -a ls is an example of a command which can take options: -a is an example of an option. The options change the behaviour of the command. There are online manual pages that tell you which options a particular command can take, and how each option modifies the behaviour of the command. (See later in this tutorial) 1.2 Making Directories mkdir (make directory) We will now make a subdirectory in your home directory to hold the files you will be creating and using in the course of this tutorial.
    [Show full text]
  • Distributed File Systems for Unix
    Rochester Institute of Technology RIT Scholar Works Theses 2-28-1986 Distributed file systems for Unix Edward Ford Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Ford, Edward, "Distributed file systems for Unix" (1986). Thesis. Rochester Institute of echnologyT . Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Rochester Institute of Technology School of Computer Science and Technology Distributed File Systems for Unix by Edward Ford A thesis submitted to the Faculty of the School of Computer Science and Technology in partial fulflliment of the the requirements for the degree of Master of Science in Computer Science Approved by: Michael J. Lutz gA~~b, Professor Michael J. Lutz Lawrence A. Coon 2L~ Professor Lawrence A. Coon Margaret M. Reek ~~h>b Professor Margaret M. Reek Title of Thesis: p;s-t-g,. byte) -Fl. Lc; Sys CeA,1$ ~D"_ VNIX I hereby (grant/deny) permissIOn to the Wallace Memorial Library, o~ RIT, to reproduce my thesis in whole or in part. Ar,y reproduction will not be for commercial use or profit. or I Ed war d Ford prefer to be contacted each time a request for reproduction is made. I can be reached at the following address: Date: 3/3 18ft, -----_. -~---------.--..... -.-- .. -- Distributed Pile Systems for DNIX(*) Edward Ford ABSTRACT With the advent of distributed systems, mechanisms that support efficient resource sharing are necessary to exploit a distributed architec ture.
    [Show full text]
  • Unit 1 Operating System
    Operating System UNIT 1 OPERATING SYSTEM Structure Page No. 1.0 Introduction 5 1.1 Objectives 6 1.2 Familiarization (I/O Port, Keyboard, Memory) 6 1.2.1 Computer and Motherboard 6 1.2.2 I/O Ports 8 1.2.3 I/O Devices 9 1.2.4 Memory 14 1.3 Windows Operating System 16 1.3.1 Overviews of Windows 16 1.3.2 Windows Installing Procedure 17 1.3.3 Working with XP 25 1.4 Linux Operating System 31 1.4.1 Overview of LUNIX/LINUX Operating System 31 1.4.2 How to install Linux Operating System 32 1.4.3 Linux utilities and Basic Commands 41 1.5 Summary 53 1.6 Answers to Check Your Progress 53 1.0 INTRODUCTION In this unit, we are going to learn basics of computer. Computer is a machine that performs tasks or calculations according to a set of instructions, or programs. Compared to those early machines, today's computers are amazing. Not only are they thousands of times faster, they can fit on your desk, in your lap, or even in your pocket. Computers work through an interaction of hardware and software. Hardware is physical component of a computer system. It is a tiny rectangular chip inside the computer called the central processing unit (CPU), or microprocessor. It is the "brain" of computer—the part that translate instructions and performs calculations. Hardware items such as monitor, keyboard, mouse, printer, and other items are often called hardware devices. Software refers to the instructions or programs that tell the hardware what to do.
    [Show full text]
  • School Tablets Project for Developing Countries
    School tablets project for developing countries ↑ Source image : A indian tablet at 35 dollars, Thursday 20 october 2011, http://electrosphere.blogspot.fr/2011/10/une-tablette-tactile-indienne-35.html French text translated by Google translator. We apologize for any translation mistakes that may have occurred. Study author : Benjamin LISAN Email : [email protected] Document creation date : 03/07/2014 Document update date : 04/07/2014. Version V1.0 School tablets for poor countries 0. Summary 2 1. Introduction 1a. secondary specifications 2. What is a tablet ? 3. Evaluation of the cost of these tablets. 4. Additional parameters to evaluate. 4.1. Tablet size. 4.1bis. Tablet weight. 4.1ter. Format of the tablet. 4.2. Importance of the existence of a microSD slot. 4.3. Minimum necessary ports or slots. 4.4. What OS? (need for a standard Android updated regularly). 4.5. Presence or absence of an external keyboard? 4.6. The fragility of the tablets => precautions. 4.6bis. The risk of theft/steal 46ter. Parental Control 4.7. What software provide? 4.8. Updating software. 4.9. The screen technology. 4.10. The resolution of the screen. School tablets for poor countries 0. Sommaire 3 4.11. The processor and memory 4.12. The "no name" tablets 4.13. Ecological aspects 4.14. Examples … 5. Conclusion. A1. Appendix: Specifications of Aakash tablets. A2. Appendix: suggestion of free software and applications. A3. Appendix: update the document database. A4. Schedule: For more ... A4. Appendix: Glossary The example of the low cost Akash Indian tablet (~ 45 US $). School tablets for poor countries 1.
    [Show full text]